topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday November 13, 2025, 4:39 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 126 127 128 129 130 [131] 132 133 134 135 136 ... 264next
3251
Living Room / Re: email provider for multiple accounts
« Last post by IainB on January 13, 2014, 05:46 PM »
it requires me to give a phone number
or an alternative email (which I don't want to give)
Have you considered lying as an option? It's served me well for this type of thing in the past.

+ 1  Good point   :Thmbsup:

Unless it were necessary for the whatever purposes of the web form - e.g., if I am ordering something online from a store - I would NEVER give my real phone number or address when filling in webforms that put it as a "mandatory" field.
If they don't need it for anything specific, then it's none of their blasted business what my phone number or address are, and I will not be obliged to provide that information. In fact, the demanding of that information in the first place is usually a good sign that the website in question is dodgy and only interested in the value of your demographic marketing data, and is likely going to sell it or use it for spamming purposes - or worse (e.g., hijack your ID). So AVOID such sites.
3252
Living Room / Re: Peer Review and the Scientific Process
« Last post by IainB on January 13, 2014, 12:47 AM »
Depressing.
Oh, Never Mind: Top 5 Retracted Science Studies of 2013

Probably speaks volumes about the "reputable" (cough, cough) journals that publish some of this rot peer-reviewed research.
3253
Great list! Thanks.
3254
Living Room / Re: Best note-taking setup with tablet and keyboard?
« Last post by IainB on January 12, 2014, 10:45 PM »
I'd echo comments at Re: Evernote, the bug-ridden elephant.

It all depends on requirements.

From my perspective, I was aiming for a Cloud+Client PIM that included keyboard note-taking (mandatory) and could be extended to tablet use (highly desirable) and multiple device iOS use (nice-to-have), for myself and my 12 y/o daughter. We are mulling over which tablet to try at the moment.
The basic mandatory requirements are listed at the above link, so I shall not repeat them here except for this, which is critical (to our requirements):
2. Data Types: The system must be able to store and make use of my Information in all its various modes/forms - including files (object linking and embedding), plain text, rich text, html (e.g., web pages), image, automatic OCR of imaged text in any image captured, audio (recording and playback), audio transcripts and searching of phrases in audio (and now video).

Cost was the major constraint.

So I settled for max $10.00 (ten dollars) - refer MS Office 2013 US$9.95 Corporate/Enterprise Home Use Program - Mini-Review

That included the whole suite of programs in MS Office Plus 2013 (some of which I do not need/use - e.g., Lync, InfoPath) and OneNote.

I refer to OneNote as a "PIM", though it has multifold uses, including note-taking. The integration of OneNote with other MS Office apps (e.g. including Word, Excel, Outlook) seems nothing short of superb - seamless and intuitive. That extends to max/full functionality integration with SkyDrive, Internet Explorer, and Win8 (so I am planning the migration to Win8/8.1 now).
The OneNote integration with the Windows OS is like an iceberg.
For example:
  • (i) Press the Windows Start button, type in a term to search for, and you will get a display of everything that has been indexed by Windows, including any references in unencrypted OneNote notebooks. (You can of course search for the term from within OneNote, to find the same term across all OneNote notebooks.)

  • (ii) Use the OneNote clipping tool to capture the image of the portion of a web page, and it will be immediately saved to OneNote and OCRed, so that you can read the "alt text" of any text in that image - MDI has apparently been integrated into OneNote. This also applies to PDF and fax document images in the notes. The alt text in any image gets indexed too.

Some of that integration in OneNote has to be seen to be appreciated. A longish trial is the only way to absorb it all - but at only $10, it can't hurt.
It is mindblowingly good and I can find no real faults with it, only disappointments to my expectations, arising from prior experience.
For example:
  • Whilst OneNote+SkyDrive would seem to far exceed the design/performance objectives of the farsighted DEC/digital "groupworks" (or whatever it was called) project for the "Holy Grail" of campus/group collaboration in the '90s, I would like to see OneNote display the same level of documentation integration between Word and Excel And Access as was achieved in Ashton-Tate's Framework IV between document text and spreadsheet and database. (InfoSelect 8 came a little way towards this.)

  • OneNote offers a useful form of tree navigation, based on an intuitive notebook, page and tab paradigm. I would like to see an optional tree navigation structure (optional for them as wants one), similar to that in (say) InfoSelect 8 - which has one of the best I have ever used. InfoSelect 8's navigation also has an innovative bulk tab/categorisation and filtered display function that I have never quite seen the like of anywhere else. (@mouser's CHS incorporates something very similar in its SQL capability.)

  • OneNote offers a quite sophisticated manual tagging function that integrates with Outlook Tasks and which is the primary reason I am now trialling the use of Outlook - having previously always avoided Outlook like the plague. However, what I would have loved to see would be the ability to automatically tag notes depending on the content, and for tags to be able to be placed in flexible tree(s) (parents/children) able to be switched as inclusive or mutually exclusive sub-groups of children, and to have conditions and actions (the actions triggered by "if this, then that") a la Lotus Agenda. (@mouser's CHS incorporates something slightly similar in its SQL capability.)

Also:
(a) Under Win7, OneNote seems to have been (re)designed for tablet integration and seems very good indeed, but is apparently still better integrated with the OS under Win8.

(b) Refer: Microsoft OneNote 2007 - some experiential Tips & Tricks. (It seems that anything OneNote 2007 does can be done by OneNote 2013, and then some.)
3255
Post New Requests Here / Re: Focus-Unfocus and let me link
« Last post by IainB on January 12, 2014, 08:17 PM »
I have had a similar requirement ("nice-to-have") for ages: Looking at a window, how does one know whether it is topmost (always on top) or not?
I used to have a FREE proggy from ZD-Net that you could use to "Pin" a window and make it topmost, and the window then displayed a small icon in the title bar of a red thumbtack to show that it was topmost.
It doesn't work in modern-day Windows.

Nowadays I use an AHK toggle switch to toggle topmost on/off for any window. The switch briefly displays a message that "Topmost is ON" or "Topmost is OFF", but that is ergonomically not as efficient as having a constantly visible red thumbtack when ON.
I have been meaning to add the red thumbtack to the AHK hotkey, but have not got around to it yet...
3256
Thankyou Erica. I am delighted if you now have it all sorted and that the trialling/testing we did was of help/use to you. I learned a lot too, in the process!    :-[

The Wuala people evidently do not seem to be geared up for what we might expect as full "end-user support".
Perhaps not all that much different to Google really...    ;)

I shall eventually post a mini-review of Wuala in the DC Forum, based on this experience, and shall try to remember to send you a personal message about it, via your ericalynne ID on this board.
3257
Living Room / Re: email provider for multiple accounts
« Last post by IainB on January 12, 2014, 07:39 PM »
As @eleman suggested: Outlook.com

Otherwise, if you just want to be anonymous when signing up to a website that insists on your giving an email address, you could use MaskMe.com (FREE Firefox add-on) for email. I use it all the time. It's very handy and preserves your anonymity and enables you to avoid spammers/hackers getting your real email address. It generates a random and unique proxy email address for you for each instance you use it (e.g., similar to [email protected]), and all email addressed to that address goes to the real email account you have designated, where it appears showing you what the proxy address was. So you can always tell which person/organisation sent you that email or passed it on to another sender.
3258
General Software Discussion / Re: Determine if a window on top is active or not
« Last post by IainB on January 12, 2014, 07:22 PM »
I also recall reading about a free download from somewhere, for a proggy that enabled you to make little screens from different concurrently running programs/videos - and you could resize and drag each little screen to somewhere you wanted and they could all stay on top. Each little screen could display either a minimized full window or a section of a window. Could be useful where you wanted to monitor several things at once.

I'm sorry I didn't make a note of it and can't recall the name of the thing at the moment, but will search it up and see if I can find it.
3259
General Software Discussion / Re: Determine if a window on top is active or not
« Last post by IainB on January 12, 2014, 07:13 PM »
Just looking in the AHK Help manual, if you wanted to know which window was "active" (on top) at any given point, I think (but I have not tried this) that the AHK command WinGet with the cmd parameter should be able to do it:
ID: Retrieves the unique ID number (HWND/handle) of a window. If there is no matching window, OutputVar is made blank. The functions WinExist() and WinActive() can also be used to retrieve the ID of a window; for example, WinExist("A") is a fast way to get the ID of the active window. To discover the HWND of a control (for use with Post/SendMessage or DllCall), use ControlGet Hwnd or MouseGetPos.
_____________________

Not sure if that is what you want though.

Otherwise, using AHK, you can get a specified window and make it active - bring it to the top - or make it always topmost with a toggle switch.
3260
Living Room / Re: Evernote, the bug-ridden elephant.
« Last post by IainB on January 12, 2014, 06:48 PM »
@Innuendo :
This is good advice:
What are you contemplating using it for should be the first question.  Images?  Audio?  Purely text?  Clipping web pages?
And what platforms are you contemplating having the need for it on?

It's all about "user requirements". Many/most people (including myself) often have not articulated/written down what their requirements are for a "new thing", because they are still forming their ideas about what they want and what is or might be possible.
I personally find that the best thing to do is to trial a software application as though it were a potentially useful tool for what you generally might want to do. In the process of trialling, you will discover something, including, for example:
  • Confirmation of your requirements, and/or discovery of new requirements.
  • Whether it can effectively do what you wanted it to do.
  • Whether what you wanted to do is feasible using that tool.
  • Whether the tool or some other similar tool you might have read/heard about could potentially offer a  - in some way - "better" (for you) approach, thus to some extent refining or redefining what you thought your requirements were - this leads to changed requirements.

So jump in for a swim and trial something that looks like it might do the job. Discover/explore all its aspects for yourself. In the case of Cloud-based PIMs (Personal Information Managers), you have a decent and growing selection, but, as I said above, it is caveat emptor (let the buyer beware), and, in particular:
Accept that a feature of life with Cloud-based services seems to be potentially reduced security and increased risk to loss/corruption of data almost inevitably arising from the user having a lack of control over data management by/on a remote third party/service.
___________________________

I have trialled Evernote, Dropbox, Google Drive, Microsoft SkyDrive and others, and I discovered that the clincher for me was that there are some general mandatory (must have) requirements that need to be met, including, for example:
  • 1. Availability: The PIM must be fully-functional, and with fully available data, whilst online and/or offline.

  • 2. Data Types: The system must be able to store and make use of my Information in all its various modes/forms - including files ( object linking and embedding), plain text, rich text, html (e.g., web pages), image, automatic OCR of imaged text in any image captured, audio (recording and playback), audio transcripts and searching of phrases in audio (and now video).

  • 3. Search/Retrieval: To enable/make use of full and fast search/extraction of information, including metadata, and hyperlinking and cross-referencing (which latter implies Wiki-like features).

  • 4. Data security: No trust. There must be provision for Client-side and Cloud-side encryption, where required, and there must be absolute minimal potential risk of breach of security, of loss/corruption of data, with recovery from same being entirely under my control (which also implies my control over full/comprehensive backups and the ability to restore from those backups).

  • 5. Sharing/Collaboration: The ability to enable specific person or group sharing of sections of the PIM database, as and when required, fully under my control (granting of read/write permissions included).

(I have various other requirements, not listed above.)

From experience so far, there is currently no single Cloud-based solution/offering that can meet the test for these general mandatory requirements, except in the combination of SkyDrive + OneNote - so, for my requirements, that's what I use.
The Data Security requirement, in particular, is/was failed by DropBox, Google Drive, and Evernote (they also fail on other requirements, with Evernote arguably being the least-worse).

So, if you are likely to have similar requirements for Data Security, then a Cloud-only solution is probably not for you, but otherwise the current crop of Cloud offerings isn't too bad, and will probably improve (as I suggested in this thread, above), and Evernote still seems to be the leader in terms of very good Cloud functionality + some good/minimal Client functionality. Your peculiar requirements should/would always be the deciding choice factor though.

Each Cloud solution will have its own idiosyncrasies and peculiarities, and these have to be evaluated in any trial to see whether you can live with the thing, longer term. More likely than not, once you have learned how to change your way of working so as to make best use of the tool, and adapted to it, then the tool will become an indispensable and useful extension of your mind, and you will probably find yourself making ever more use of the tool because of that - and you could become reliant on it. (That is why Data Security is always an important requirement for me.)
3261
New announcements:
  • SoftEther VPN Became Open Source on 2014-01-04.
  • There is an update to vpngate-client-2014.01.12-build-9411.128655.zip
  • More details + an interesting table comparing OpenDNS v. SoftEtherVPN on the download page.

Here's a snippet from the download page:
SoftEther VPN Became Open Source on January 4, 2014
January 4, 2014
By Daiyuu Nobori, SoftEther VPN Project at University of Tsukuba, Japan.

We are very happy to announce that the source code of SoftEther VPN is released as open-source software under the GPLv2 license. SoftEther VPN is the underlying VPN engine of VPN Gate. The source code is provided as packages in .tar.gz and .zip formats, and is also published on our GitHub repository. You can build the full SoftEther VPN programs from the source code in Windows, Linux, Mac OS X, FreeBSD or Solaris computers. You can also generate your own customized installer packages of SoftEther VPN automatically from the source code.
3262
Living Room / Re: Periodic Videos by Brady Haran
« Last post by IainB on January 11, 2014, 04:00 PM »
Really good, concise video from numberphile:
How did the NSA hack our emails?



3263
Living Room / How did the NSA hack our emails?
« Last post by IainB on January 11, 2014, 03:57 PM »
Really good, concise video from numberphile:
How did the NSA hack our emails?


3264
Living Room / Re: Why George Orwell wrote 1984
« Last post by IainB on January 11, 2014, 04:11 AM »
Quite by chance, I was reading this post today in Standpoint - Pareto Humanity - which was suggesting that the Italian School of economics had always been right (i.e., applicable, and theories not disproven), though they weren't popular in economics teaching classes.
The author then refers to Pareto's assertion that the elite was a necessary and natural component of an economic theory where any organisational structure would tend to be structured as a pyramid, with big boxes at the the bottom and successively smaller boxes atop each other to the top.
Rings a bell...

In para 3 he writes:
Yet all the evidence continued to favour the Italian School, especially the history of the Soviet Union, evolving an apparatchiki and a nomenklatura with unprecedentedly structured privileges (like their own exclusive shops) exactly as the theory suggested they would. Orwell's Animal Farm reads pretty naturally as an Italian School allegory about the USSR.
__________________________
I must admit that, since reading Animal Farm as a 12 y/o, I had always seen it as an allegory about the USSR, but I did not know at the time, or later, that it was so aligned wit the Italian school of economics.
You learn something new every day - if you're lucky.    :)
3265
Living Room / New form of cryptanalysis - "Rubber Hose"
« Last post by IainB on January 11, 2014, 01:46 AM »
Rubber-hose cryptanalysis - Wikipedia, the free encyclopedia
For the encrypted filesystem, see Rubberhose.

In cryptography, rubber-hose cryptanalysis is the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture[1][2]—such as beating that person with a rubber hose, thus the name—in contrast to a mathematical or technical cryptanalytic attack.

According to Amnesty International and the UN, many countries in the world routinely torture people.[3][4][5][6] It is therefore logical to assume that at least some of those countries use (or would be willing to use) some form of rubber-hose cryptanalysis.[1] In practice, psychological coercion can prove as effective as physical torture. Not physically violent but highly intimidating methods include such tactics as the threat of harsh legal penalties. The incentive to cooperate may be some form of plea bargain, such as an offer to drop or reduce criminal charges against a suspect in return for full co-operation with investigators. Alternatively, in some countries threats may be made to prosecute as co-conspirators (or inflict violence on) close relatives (e.g. spouse, children, or parents) of the person being questioned unless they co-operate.[4][7]

In some contexts, rubber-hose cryptanalysis may not be a viable attack because of a need to decrypt data covertly; information such as passwords may lose its value if it is known to have been compromised. It has been argued that one of the purposes of strong cryptography is to force adversaries to resort to less covert attacks.[8]

The earliest known use of the term was on the sci.crypt newsgroup, in a message posted 16 October 1990 by Marcus J. Ranum, alluding to corporal punishment:

    ...the rubber-hose technique of cryptanalysis. (in which a rubber hose is applied forcefully and frequently to the soles of the feet until the key to the cryptosystem is discovered, a process that can take a surprisingly short time and is quite computationally inexpensive).
    —[9]

Although the term is used tongue-in-cheek, its implications are serious: in modern cryptosystems, the weakest link is often the human user.[10] A direct attack on a cipher algorithm, or the cryptographic protocols used, is likely to be much more expensive and difficult than targeting people who use or manage the system. Thus, many cryptosystems and security systems are designed with special emphasis on keeping human vulnerability to a minimum. For example, in public-key cryptography, the defender may hold the key to encrypt the message, but not the decryption key needed to decipher it. The problem here is that the defender may be unable to convince the attacker to stop coercion. In plausibly deniable encryption, a second key is created which unlocks a second convincing but relatively harmless message (for example, apparently personal writings expressing "deviant" thoughts or desires of some type that are lawful but taboo), so the defender can prove to have handed over the keys whilst the attacker remains unaware of the primary hidden message. In this case, the designer's expectation is that the attacker will not realize this, and forego threats or actual torture.

In some jurisdictions, statutes assume the opposite—that human operators know (or have access to) such things as session keys, an assumption which parallels that made by rubber-hose practitioners. An example is the United Kingdom's Regulation of Investigatory Powers Act,[11][12] which makes it a crime to not surrender encryption keys on demand from a government official authorized by the act.

According to the Home Office, the burden of proof that an accused person is in possession of a key rests on the prosecution; moreover, the act contains a defence for operators who have lost or forgotten a key, and they are not liable if they are judged to have done what they can to recover a key.[11][12]
3266
Living Room / Re: Why George Orwell wrote 1984
« Last post by IainB on January 11, 2014, 12:07 AM »
So whenever given a choice between A and B, it's important to remember there's also a third option: neither.
Exactly.
On the topic of total control...
Camp 14 : Total Control Zone
FAIR WARNING: This is about a fellow who was born into a North Korean death camp and escaped. It might not be all that wonderful for some to watch. Of particular note is how and what he thought, e.g. that beating a girl to death in a school classroom was normal, that torture was normal, that he thought the rest of the world was exactly like where he was, etc. Oddly enough, if you think about it a little bit, you probably know (or are) people who have similar though patterns, though your circumstances be different...
http://www.camp14-film.com/
______________________________

Very interesting movie. Thanks for the link.
We have the capability to hold different paradigms and images in our minds. The image that is in our minds of "the way things are" tends to be set by our experiences/interpretations of what passes for us as reality. We might never even question it, though when it is challenged by a potentially contradictory opinion/view of reality, we may tend to fiercely protect it (e.g., as in some of the discussion above).
But there is also potentially an image of "the way things might/could be for the better". This idea was discussed in a rather profound and wise Stanford Research Institute report The Changing Images of Man. (You will read it when you are ready for it.)
In it, they gave a diagram illustrating a theory of mankind's development as being a constant spiralling push-pull dance between two changing things:
(a) The "operational" images of man in the minds of men;
(b) The "behavioural" image of man imposed by society.

SRI Report - Changing Images of Man - hypothetical time + phase graph.png

Sometimes one thing has the role of leading, pulling the other upwards, then a role switch occurs as their paths briefly intersect. When they are furthest apart there would be the greatest tension and pressure to come together, but always forwards and upwards.
This theory offers a most profound piece of hope, requiring only imagination.
As Freddy Mercury sang:
"This could be Heaven.
This could be Heaven, for everyone."

_____________________
Some things stand repeating. There is potentially life-changing wisdom in this, for those who want to or can see/imagine the implications, which is why I repeat it here.
YMMV though.    ;)
3267
Living Room / Re: Evernote, the bug-ridden elephant.
« Last post by IainB on January 10, 2014, 10:02 PM »
You could synthesize this interesting Evernote episode down to some learning experiences, from a typical user's perspective:
  • Don't panic, and don't react without careful thought.
  • Don't take it as a "Jump ship now!" event, even if there are problems.
  • Yes, there certainly are bugs/problems in Evernote (QED), but so is the case with other Cloud-based repositories, and they are arguably all likely to be in much the same condition if you but knew it - e.g., DropBox (QED).
  • Not all of these bugs/problems will affect every user.
  • Hang on to whichever service provider you are currently using, as they will very probably be earnestly working to continuously improve the quality of service and the quality of service level performance.
  • Accept that a feature of life with Cloud-based services seems to be potentially reduced security and increased risk to loss/corruption of data almost inevitably arising from the user having a lack of control over data management by/on a remote third party/service.

As if to add emphasis to this, per Hacker News:
Dropbox is down
minimaxir 1 hour ago | link

Apparently the website has been compromised: https://twitter.com/...s/421820685766250496
The hackers are also threatening a database leak: https://twitter.com/...s/421822727331131392
EDIT: Dropbox's statement is that it's maintainance issues: https://tech.dropbox...opbox-status-update/
3268
2014-01-11 1442hrs: Following on from the above, and thanks for the helpful comments.

Its a Saturday, and I managed to make some time to look into this some more.
I checked in the online W7FC Frequently Asked Questions, and found this:
Multiple app(1), app(2) etc entries in Programs list.
   The firewall distinguishes the applications by full path name, so C:\FolderA\ABC.EXE and C:\FolderB\ABC.EXE will be listed by the firewall separately. That is correct as the applications (executables) are different formally. However, if there are two (or more) instances of absolutely the same executable, the firewall adds (2),(3) etc suffixes listing instances of the executable separately. You can rename the applications in the list if it is required. There are some specific applications (usually installers or update checkers) those generate network active helpers for every single network access attempt. The helpers (executables) are generated randomly and named unpredictably usually, however the helpers are binary equal. As the initial access attempt is blocked by the firewall the helper is blocked accordingly (but listed), the parent application generates new helper under a different name then, the helper is blocked again and the process loops endlessly. If the activity is expected safe, the solution is creating a (temporary) applicationless rule to enable the destination for the updating/installation of any application via Blocked Events pane (check the manual for the details). The next helper generated will be permitted to reach the desired destination before the initial detection block as the result. TrayIcon/RightClick/Mode:EnableAll setting switches the firewall off finally. The update/installation can be made manually as well.
____________________________

At the Blocked Events link, it said:
   Right clicking listed event (or using the toolbar) allows composing/adding a corresponding permitting rule to the application. The rules are created and applied (if required) to the blocked application to avoid blocking of the same reason in the future. Corresponding rules can be created/applied to all the applications at once by updating "Zone for All the Applications" (check Settings tab for the details). The blocked event destination address ownership can be verified via a free online WHOIS database.
    There is a set of options to set the permitting rule for the blocked IP only, IP sub-network, with or without destination port limitations at your option.
    The permitting rule is created automatically, shown in the final zone draft, can be edited and applied to the application (or all the applications) after confirmation. The rules are applied to applications listed in the Programs pane directly.
____________________________

I then did a WHOIS  (using W7FC) to check a few (not all) of the incoming IP blocks in W7FC:
W7FC - 03 Blocked incoming WHOIS.png

Most of those were blocks for HPWS (Host Process for Windows Services). One was for a program name (not HPWS) that I had not adequately enabled access for in the W7FC Programs authorisation list, so I fixed that one by assigning it the correct access rights via that list.
All the HPWS incoming IP blocks I checked were from valid IP addresses to reputable companies that I would expect my PC applications might want to be using via HPWS, so I enabled each as in the diagram below, building up the list that you see there of enabled incoming IP addresses:
W7FC - 04 enable Blocked incoming.png

There was a block/range of blocked IP addresses that was owned by Google: 173.194.0.0 - 173.194.255.255
Given what we now seem to know of the cynical nature of NSA and Google's apparently excessively invasive methods, post SnowdenGate, I decided not to enable all these IP addresses and am mulling it over.

This step should now start to clear up the confusion of the table of W7FC's blocked incoming items, though I am unsure of whether it will affect the pings being blocked by the router.
3269
Mini-Reviews by Members / Re: Stick-A-Note + Universal Viewer - Mini-Review
« Last post by IainB on January 09, 2014, 11:21 PM »
2014-01-10: Made various updates to the review in the opening post.
3270
Mini-Reviews by Members / Re: Stick-A-Note + Universal Viewer - Mini-Review
« Last post by IainB on January 09, 2014, 09:00 PM »
...Now if only Stick-A-Note had some kind of a basic note-viewer pane that could be called up with a shortcut, and the ability to export the notes (individually or collated into a single text file).  ;)
_____________________________
You effectively can already have tree-style note-viewing and editing capability - using, for example:
(a) Universal Viewer;
(b) Windows Explorer;
(c) xplorer²;
- as per above examples/images.

I find the use of xplorer² is the best as it is so fast to edit a file (press F3) using the built-in editor.
If you wanted to open up and edit several note files at once, Send To a tabbed editor such as (for example) EditPad Lite would do nicely (I regularly use EditPad Lite for editing several text files at once).

As I wrote above:
From my perspective, it is lacking a "tree viewer", and the Universal Viewer therefore seemed a useful addition, as well as being a powerful multi-purpose viewer in its own right.
Given this, unless you wanted to add some additional new functionality, then creating a special notes tree-viewer for viewing standard, non-proprietary txt files in the "database" (which is a folder) might seem to be an exercise in redundancy - i.e., unnecessary.
3271
Living Room / Re: Why George Orwell wrote 1984
« Last post by IainB on January 09, 2014, 05:50 PM »
...James Madison summed it up even more succinctly in 1787:
"In time of actual war, great discretionary powers are constantly given to the Executive Magistrate. Constant apprehension of War, has the same tendency to render the head too large for the body. A standing military force, with an overgrown Executive will not long be safe companions to liberty. The means of defence against foreign danger have been always the instruments of tyranny at home. Among the Romans it was a standing maxim to excite a war, whenever a revolt was apprehended. Throughout all Europe, the armies kept up under the pretext of defending, have enslaved the people."
__________________________
Very thought-provoking. Of course, that was then. This sort of thing couldn't possibly happen today ... oh, but wait...
3272
Living Room / Re: Evernote, the bug-ridden elephant.
« Last post by IainB on January 08, 2014, 09:19 PM »
...As the time ticked down, I had the brilliant idea to make a recording using Evernote on my phone....
That's a rather nifty idea - if it works, which it apparently didn't at the time.
Would it work now - that is, if the technology doesn't still frustrate it? (Would that give you a voice transcript?)
Would it/does it work on Google Keep? (Which provides voice transcripts doesn't it?)
3273
Living Room / Re: EditGrid service is ending May 1, 2014
« Last post by IainB on January 08, 2014, 07:57 PM »
Just got an email from EditGrid reminding me that the closure date is still May 1, 2014.

If anyone reading this is wondering what the heck EditGrid is, my greatest use for it has been in collaboratively sharing spreadsheets and and data. The most useful spreadsheet there that I know of is one that has been maintained for years by users of OutlinerSoftware forum, where there is the EditGrid list of Outliners.
3274
DC Member Programs and Projects / Re: Clipjump - Clipboard Manager
« Last post by IainB on January 08, 2014, 11:23 AM »
Thanks.
I just turned that into this form: http://tcpdiag.dl.so...mp/Clipjump_10.6.zip
- and it downloaded with no problem.
3275
Living Room / Re: Evernote, the bug-ridden elephant.
« Last post by IainB on January 08, 2014, 10:54 AM »
Well, whether or not Evernote users think there are bugs in Evernote, it looks as though the Evernote CEO thinks there are, and he's going to fix things. There's his very well-written response post to Kincaid's complaints on the Evernote blog.
Judging by a lot of the comments from self-confessed Internet users across the Internet on this, and by the CEO's post, this must all have been quietly festering for some time before Kincaid championed the cause.
It also seems - from @wraith808's comments above - that some users hadn't noticed or heard/read of anything to be concerned about.
As I wrote above:
Caveat emptor, it seems:

(Evernote CEO's post copied below sans embedded hyperlinks/images.)
On Software Quality and Building a Better Evernote in 2014 | Evernote Blog Evernote Blog
Our Notes | 04 Jan 2014 | By Phil Libin

I got the wrong sort of birthday present yesterday: a sincerely-written post by Jason Kincaid lamenting a perceived decline in the quality of Evernote software over the past few months. I could quibble with the specifics, but reading Jason’s article was a painful and frustrating experience because, in the big picture, he’s right. We’re going to fix this.

The past couple of years have been an amazing time for Evernote. We’ve grown massively as a company, a community and a product. And we’re still growing quickly. However, there comes a time in a booming startup’s life when it’s important to pause for a bit and look in rather than up. When it’s more important to improve existing features than to add new ones. More important to make our existing users happier than to just add more new users. More important to focus on our direction than on our speed. This is just common sense, but startups breathe growth and intentionally slowing down to focus on details and quality doesn’t come naturally to many of us. Despite this, the best product companies in the world have figured out how to make constant quality improvements part of their essential DNA. Apple and Google and Amazon and Facebook and Twitter and Tesla know how to do this. So will we. This is our central theme for 2014: constant improvement of the core promise of Evernote.

This isn’t something we just decided yesterday. We kicked off a company-wide effort to improve quality a couple of months ago. The precipitating factor was the frustrating roll-out of our iOS 7 version. We gained many new users, but rushing to completely rebuild the app for the new platform resulted in stability problems that disproportionally hit longer-term customers, including ourselves. Since all Evernote employees are power users by definition, no one is more motivated to make Evernote better just for the sake of our own productivity and sanity. I’ve never seen people happier to just fix bugs.

Quality improvements are the sort of thing that you ought to show, not just talk about, so we hadn’t planned on discussing this theme until closer to the end of 2014. However, Jason’s article hit too close to home to leave unremarked, so I decided to be up front about what we’ve done in the past few months and what we’re going to do in the next few.

Staffing
Today, there are 164 engineers and designers working at Evernote. About 150 of them are currently assigned to our core software products. The total number will increase quite a bit in 2014, but the proportion will stay the same: over 90% of our resources will go towards improving our core experiences.

Past Two Months: Stability
Starting last November, our first priority was to drastically improve the stability and performance of our main apps, especially for long-term users with many notes. We’ve made significant progress, and Evernote is measurably less buggy than it was two months ago.

We’re starting to see the initial results of this effort in our app store ratings. For instance, when we started this effort in November, Evernote for iOS 7 was at a frustratingly low 2 stars. Today, it’s at 4.5. Our customer support volumes for iOS have been cut by more than half: from an average of 366 per day in November, to 148 now. We’ve made similar improvements to many of the other apps as well. I’m proud of the progress we’ve made in this area, but just because an app has a good rating, doesn’t mean that our work is finished; there are countless improvements to stability and performance that we’ll continue to make.

These are recent improvements, but the perception of stability is a lagging indicator of actual stability; you judge how solid or buggy an app feels based on your past few months of experience with it. So even though Evernote is a lot better already, and will get much better still, it’ll take longer for this feeling to really sink in. We understand that we have to maintain a high level of quality for the long term, if we want Evernote to be seen as a truly high-quality product.

Near Future: Design and Simplicity
As we get nearer to achieving our stability and performance goals, we’ve turned our attention to the other important component of quality: great design. Over the next few months, we’ll be releasing new versions of all the apps that incorporate our many lessons learned about what does and doesn’t work. All of our apps will be getting significant improvements and simplifications to the user experience starting in the next few weeks. The five most important areas of improvement that we’re targeting on all platforms are note editing, navigation, search, sync and collaboration.

Our new philosophy is to find every spot in our products where we’ve been forced to make a trade-off between doing what’s simple and doing what’s powerful, then rethink it so that the simplest approach is also the most powerful. We know we’ve found a good design for something when that conflict disappears. It feels like magic when that happens, and we’ll have several bits of magic in the coming months.

I turned 42 yesterday, which is the year that, according to classics of western literature, life, the universe and everything will start to make sense. This isn’t the way I imagined it starting, but I’m glad to have the chance to tell you what we started a few months ago, and what we’re going to be focusing on in 2014.

Thanks to Jason and to the millions of Evernote users who depend on us every day and who go through the effort of fighting for a better Evernote. Our goal isn’t to have a product that’s just good enough that users rely on it despite its warts, it’s to have a world class product, built with solid technology and with a fit and finish worthy of our users’ love and loyalty.

We’re the biggest Evernote users around, and it’s important to be in love with what you build.

It’s going to be a great year.

- Phil Libin, CEO

PS. To address Jason’s specific point about privacy concerns related to the Mac Helper:

There is no inherent privacy problem, but Jason’s article did alert us to a bug in our menu bar helper quick note feature for Mac. This bug resulted in an extra copy of quick notes being stored in the activity log on your local hard drive. This in itself isn’t a serious problem, but it was incorrect for our support staff to suggest that emailing the log file couldn’t expose any sensitive information. We’ve made three immediate changes as a result: (1) The menu helper bug has been fixed, and is available in the direct download version of Evernote for Mac. (2) A message now appears when you click the “email log” button that warns users that the logs may contain some account information such as note title and notebook names, which can be removed if desired, as well as other metadata designed to help the user and support engineer work together to quickly diagnose problems. (3) We’ve changed the training of our support staff so that they now warn users that note titles and notebook names are present in the log file, and that users can remove them, if desired.
Pages: prev1 ... 126 127 128 129 130 [131] 132 133 134 135 136 ... 264next